100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor$7.99
Add to cart
CIMP - Certificate In Investment Performance Measurement
CIMP - Certificate in Investment Performance Measurement
Exam (elaborations)
D333- Ethics In Technology Terms in this set (176) vitrue a habit that inclines people to do what's acceptable vice A habit of unacceptable behavior Integrirty acts in accordance with personal code of principles Bathesheba Syndrome the moral cor
13 views 0 purchase
Course
CIMP - Certificate in Investment Performance Measurement
Institution
CIMP - Certificate In Investment Performance Measurement
D333- Ethics In Technology
Terms in this set (176)
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
Bathesheba Syndrome the moral corruption of people in power, also a te...
vitrue a habit that inclines people to do what's acceptable
vice A habit of unacceptable behavior
Integrirty acts in accordance with personal code of principles
the moral corruption of people in power, also a tendency for people to look the other
Bathesheba Syndrome
way when leaders act inappropriately
Software & Information Industry Association trade groups that represent largest software and hardware manufactures, stop
(SIIA) & BSA unauthorized copyright, protect intellectual property, provides education
Misrepresentation A false statement or lie that can render the contract void.
breach of contract A failure to perform, as promised, at the time the performance was due.
Organization's internal control all people, policies, processes, procedures, & systems controlled by management
makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on any
US stock exchange
body of knowledge An agreed-upon sets of skills and abilities that all licensed professionals must possess.
develops, administers, and scores the examinations used for engineering and survey
National Council of Examiners & Surveying
licensure in the US
not doing something a reasonable person would do/ something a reasonable person
Negligence
would not do
the obligation people owe each other not to cause any unreasonable harm or risk of
Duty of Care
harm
A legal standard that defendants who have particular expertise or competence are
Reasonable Professional Standard
measured against.
A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.
Professional Malpractice break of duty of care by a professional
A cyberattack that takes place before the security community and/or software
Zero-Day Exploit
developers become aware of and fix a security vulnerability.
1/6
, 8/12/24, 11:19 AM
someone who violates computer or internet security maliciously or for illegal personal
Black Hat Hacker
gain
An employee or contractor who attempts to gain financially and/or disrupt a company's
Malicious Insider
information systems and business operations
Cybercriminal Someone who attacks a computer system or network for financial gain
Someone who attempts to destroy the infrastructure components of governments,
Cyberterrorist
financial institutions, utilities, and emergency response units
Cracker An individual who causes problems, steals data, and corrupts systems
Ransomware malware until you meet certain demands
A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.
a harmful program that resides in the active memory of the computer and duplicates
Worm
itself
Trojan Horse A seemingly harmless program in which malicious code is hidden.
Blended Threat combines various types of exploits and vulnerabilities in one payload
a malicious hacker takes over computers via the internet and causes them to flood a
DDoS Attack/ Denial of Service Attack
target site with demands for data/small tasks
A set of programs that enables its user to gain administrator level access to a computer
Rootkit
without the end user's consent or knowledge.
APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.
Spear Phishing Fraudulent emails to a certain organizations employees.
Smishing Phishing attacks committed using text messages (SMS).
Large federal agency with a budget of almost $65 billion whose goal is to provide a
Department of Homeland Security DHS
more safer, more secure America, which is resistant to terrorism and potential threats
Address fraud and related activities in association with computers including access.
Computer Fraud and Abuse Act (CFAA) 1986
transmission, password trafficking, and threats/
Fraud and Related Activity in Connection Covers dales claims regarding unauthorized use of credit cards
with Access Devices Statute
Stored Wire and Electronic Communications Focuses on unlawful access to stored communications to obtain, alter, or prevent
and Transactional Records Access Statutes unauthorized access to electronic communication while it is in electrical storage.
(U.S. Code Title 18, Chapter 121)
Defines cyberterrorism and associated penalties. Gave new powers to domestic law
enforcement and international intelligence agencies. Increasing the ability of law
USA Patriot Act 2001
enforcement agencies to search all kinds of records. It also eased restrictions on
foreign intelligence gathering in the US.
The recognition that managers must use their judgment to ensure that the cost of
Reasonable Assurance
control does not exceed the system's benefits or the risks involved.
Guidelines and arrangements for response to disruption of critical business functions,
Business Continuity Plan
to restore and maintain operation.
requires financial institutions in the United States to assist U.S. government agencies to
Bank Secrecy Act 1970
detect and prevent money laundering.
Makes certain payments to foreign officials and other foreign persons illegal and
Foreign Corruption Practices Act 1977
requires companies to maintain accurate records
D333- Ethics In Technology
2/6
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.